Skip to content
K2Integrity Logo 2024
  • Practice Areas
    • Financial Crimes Risk Management
      • Agile Technologies
      • Investment Adviser FinCEN Rule Services
      • Sanctions and Trade Controls
      • AML and Sanctions Model Validation, Tuning, and Testing
      • Know Your Customer (KYC) Due Diligence
      • Sportsbook and Gambling Compliance
      • Comprehensive Compliance and Risk Management Training, Testing, and Certification
      • Outsourced Financial Crime Risk Management (Managed Services)
      • Transaction Monitoring Advisory Services
      • Enterprise-Wide Financial Crime Risk Assessment
      • Regulator Mandated Monitorships and Independent Consultancies
    • Strategic Advisory
      • Anti-Money Laundering and Combating the Financing of Terrorism (CFT), Sanctions, and Fraud Compliance Programs
      • Public-Private Financial Information Sharing Partnerships
      • Supply Chain Risk
      • Jurisdictional AML/CFT Regimes
    • Investigations and Disputes
      • Asset Tracing and Recovery
      • Financial Investigations and Forensic Accounting
      • Internal Investigations
      • Construction Risk Management
      • Fraud Detection Analytics and Investigations
      • Investment Integrity Program
      • Corporate and Shareholder Activism
      • Intelligence and Risk Advisory Services
      • Litigation Support
      • Dispute Advisory Services
      • Intellectual Property and Counterfeiting Investigations
      • Private Client Services
    • Internal Audit Services
    • Cyber and AI Resilience
    • Crypto and Digital Asset Solutions
    • National Security and CFIUS
  • Who We Serve
  • Insights
    • Newsroom
    • Knowledge Center
    • Events
  • About Us
    • Our Story
    • Our Approach
    • Our Team
    • Careers
    • Partnerships
    • Our Commitment to ESG
    • Security & Compliance​
  • Contact Us

Security & Compliance

Know your data is safe with K2 Integrity

K2 Integrity is continuously expanding our portfolio of Security & Compliance Reports as our customers request them. The following is the current list of reports available to all Customers under NDA. We hope the steps we have taken help current and future clients and their IT teams remain confident in knowing that their data is secure with K2 Integrity.

AICPA SOC 2 Type II ​

A SOC 2 report highlights the controls in place that protect and secure an organization’s system or services used by its customers. In order for an organization to pass a SOC 2 examination and receive a letter of attestation, the organization must address controls in areas such as information security, access control, vendor management, system backup, business continuity and disaster relief, and more.

ISO27001:2013 ​

The International Organization for Standardization 27001 Standard (ISO 27001) is an information security standard that ensures office sites, development centers, support centers and data centers are securely managed.

To learn more about our security policies and initiatives, please contact Gerald Werner at [email protected].

K2Integrity Logo 2024

Looking for a financial crimes, risk, or regulatory advisory firm?
Contact us today to find out how we can help you manage risk.

Talk to Us
Slavery and Human Trafficking Statement
This statement is published by K2 Integrity Holdings Inc (K2 Integrity) in response to Section 54(1), Part 6 of the UK Modern Slavery Act 2015 and encompasses the fiscal year 2022-2023. Read More

Contact Us | Careers With K2 Integrity | Submit RFP

Abu Dhabi · Chicago · Doha · Geneva · London · Los Angeles · Miami · New York · Riyadh · Washington, D.C.

© 2015 - 2022 K2 Integrity Holdings, Inc. K2 Integrity™ is a federal trademark owned by K2 Integrity Holdings, Inc. Privacy Notice | CA Privacy Notice
K2 Integrity is not affiliated with Kroll Inc., Kroll Associates, Inc., Kroll On Track, Inc. or their affiliated businesses.
IL Private Detective Agency License # 117 001760

Contact Us About Your AI Governance, Risk, and Compliance Needs

Download: A Collaborative Approach to Customer Risk Assessment

To receive a copy of the article, please complete the required fields and click “Submit.”